Giuseppe Ateniese

Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2025

Research activity per year

Fingerprint

Dive into the research topics where Giuseppe Ateniese is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • LLMmap: Fingerprinting for Large Language Models

    Pasquini, D., Kornaropoulos, E. M. & Ateniese, G., 2025, Proceedings of the 34th USENIX Security Symposium. p. 299-318 20 p. (Proceedings of the 34th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • You Don't Need All Attentions: Distributed Dynamic Fine-Tuning for Foundation Models

    Ding, S., Zhang, L., Wang, Z., Ateniese, G. & Yuan, X., 2025, International Joint Conference on Neural Networks, IJCNN 2025 - Proceedings. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation

    Ateniese, G., Baldimtsi, F., Campanelli, M., Francati, D. & Karantaidou, I., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). p. 3-39 37 p. (Lecture Notes in Computer Science; vol. 14921 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Atomic Swaps for Boneh–Lynn–Shacham (BLS) Based Blockchains

    Gokay, H., Baldimtsi, F. & Ateniese, G., 2024, Computer Security – ESORICS 2024 - 29th European Symposium on Research in Computer Security, Proceedings. Garcia-Alfaro, J., Kozik, R., Choraś, M. & Katsikas, S. (eds.). p. 341-361 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14984 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services

    Pasquini, D., Francati, D., Ateniese, G. & Kornaropoulos, E. M., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. p. 1405-1423 19 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review